Welcome!

Artificial Intelligence Authors: Yeshim Deniz, Pat Romanski, Elizabeth White, Liz McMillan, Zakia Bouachraoui

News Feed Item

Armor5 Raises $2M for World's First "Zero Touch" BYOD Security Service

Trinity Ventures Leads Funding in Cloud Startup Whose Service Lets Mobile Workers Access Enterprise Apps and Data Without Content Ever Residing on Their Mobile Devices

SANTA CLARA, CA -- (Marketwire) -- 02/27/13 -- Armor5 emerged from stealth mode today and announced $2 million in seed funding from Citrix Startup Accelerator, Nexus Venture Partners and Trinity Ventures, to redefine data security and compliance for the mobile enterprise. Founded by security, mobility and cloud computing experts from Adobe, Motorola and Yahoo, Armor5 is the first zero touch service to safeguard intranet, cloud data and applications by ensuring content from these systems never actually resides on the end-users' devices. A beta version of the Armor5 service is available on its website today.

How Armor5 works

Most BYOD security services focus on individual mobile device management. As the use of these devices grows dramatically, new approaches are required to help IT balance the needs between user productivity vs. maintaining security and compliance. According to Osterman Research, annual IT costs for managing smartphones rose 48% from 2011 to 2012. Armor5 has taken an entirely different approach to solving the BYOD security problem. Its service connects to a company's network via VPN, virtualizes intranet data and cloud applications, and generates a secure URL that mobile workers can use to access content and applications safely from any device -- personal or company issued. The entire provisioning process, from IT sign-up to end-user productivity, takes just a few minutes.

"Our vision is to create a completely self-service, cloud-based answer to the security problems posed by today's explosive growth in enterprise mobility," said Suresh Balasubramanian, CEO at Armor5. "We solve immediate pain in the areas of mobility, network security and regulatory compliance. And we do so in a way that provides end-users immediate access to the apps, data and content they need from any device they're using, without sacrificing data security."

"Zero touch" deployment

In launching its service, Armor5 is introducing a radically simple concept it calls "zero touch" BYOD security. Simply, Armor5 can be deployed without mobile client software installation; without mobile security agents; without any configuration on the part of IT; and without intranet data or enterprise cloud applications ever downloaded to the end-user device. "Zero touch means faster time to deployment, better security and compliance, improved mobile user productivity, and a substantially lower cost for BYOD security," commented Balasubramanian.

For additional security, Armor5 offers dynamic watermarking and the disabling of downloading, forwarding and printing of documents. Using the cloud-based Armor5 dashboard, IT can easily monitor and manage end-users, devices and documents, and ensure BYOD policies and compliance standards are being met while providing analytics to speed auditing and reporting.

Industry support

"We have been evaluating the Armor5 solution for our data security and compliance needs," said Keith Phillips, Chief Information Officer, CPP, Inc. "We have been impressed by the simplicity, elegance and ease of setup and use of this novel, 100% cloud-based solution, requiring no agents to install on any device. Their dashboard gives us exposure to detailed activity information that has the potential to evolve into an integral part of our compliance and risk management strategy," said Phillips.

"IT must manage compliance in an increasingly BYOD world, without negatively impacting the user experience," said Michael Osterman, principal and founder at Osterman Research. "Armor5's unique and interesting approach accomplishes both and should be seriously considered by anyone struggling with BYOD in their organization."

"CIOs are understandably concerned with data security given the rise of smartphones, tablets and other mobile devices inside their organizations," said Fred Wang, general partner at Trinity Ventures. "Armor5 is the first vendor to address the BYOD security problem without requiring software installation on the mobile device. Its singular focus on the intersection of data security and BYOD, and its unique approach to solving the problem, is the reason we are investing."

"Corporate asset management, compliance and enterprise security are critical concern areas as the global workforce becomes more flexible and mobile," said Naren Gupta, co-founder and managing director at Nexus Venture Partners. "We are excited about Armor5's innovative approach to address these opportunities simply and seamlessly."

"Armor5 has tremendous potential to complement Citrix technologies in addressing BYOD challenges," said Dr. Michael Harries, Senior Director and Chief Technologist at the Citrix Startup Accelerator, which has incubated Armor5. "The service is ideal for CIOs who need an immediate solution to enterprise data security and compliance challenges with the growth of BYOD."

About Armor5
Armor5, Inc. is a cloud service provider that's solving the problem of secure mobile access to enterprise data and applications in a new way. The company serves enterprises, cloud solution providers and any organization struggling to secure network access for mobile users. Armor5 offers the only zero touch, 100% cloud service that accesses a client's network, virtualizes enterprise data and applications, and provisions secure and compliant access for every end user using any mobile device. Founded in 2011 by former executives from Adobe, Motorola and Yahoo, the company is privately held with patent-pending technology and investment from leading venture capital firms. For more information, visit www.Armor5.com.

Media contact
Kevin Wolf
TGPR
(650) 327-1641
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...